Author of the publication

On the Nonlinearity of Discrete Logarithm in F2nF_2^n.

, and . SETA, volume 6338 of Lecture Notes in Computer Science, page 333-345. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A multidimensional linear distinguishing attack on the Shannon cipher., and . Int. J. Appl. Cryptogr., 1 (3): 161-168 (2009)An upper bound for the linearity of Exponential Welch Costas functions.. Finite Fields Their Appl., 18 (4): 855-862 (2012)On the Nonlinearity of Discrete Logarithm in F2nF_2^n., and . SETA, volume 6338 of Lecture Notes in Computer Science, page 333-345. Springer, (2010)A Key-Recovery Attack on SOBER-128., and . Symmetric Cryptography, volume 07021 of Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, (2007)A practical distinguisher for the Shannon cipher., , , , and . J. Syst. Softw., 83 (4): 543-547 (2010)Process State and Progress Visualization Using Self-Organizing Map., , , and . IDEAL, volume 4224 of Lecture Notes in Computer Science, page 73-80. Springer, (2006)Estimating Resistance against Multidimensional Linear Attacks: An Application on DEAN., , and . Inscrypt, volume 7763 of Lecture Notes in Computer Science, page 246-262. Springer, (2012)Linear Distinguishing Attack on Shannon., and . ACISP, volume 5107 of Lecture Notes in Computer Science, page 297-305. Springer, (2008)Consecutive S-box Lookups: A Timing Attack on SNOW 3G., , , and . ICICS, volume 6476 of Lecture Notes in Computer Science, page 171-185. Springer, (2010)Cache-Timing Template Attacks., and . ASIACRYPT, volume 5912 of Lecture Notes in Computer Science, page 667-684. Springer, (2009)